Similar Articles |
|
PC Magazine May 11, 2009 Neil J. Rubenking |
Prevx 3.0 This behavior-based tool does better overall than its signature-based competition-and it's tiny, because detection takes place in the cloud. |
PC World June 2005 Scott Spanbauer |
Rootkits: Invisible Assault on Windows These clever attacks are not new, but they pose a growing threat to Windows PCs. Since rootkits can work with spyware, viruses, and other malware in blended threats, security vendors are sharpening the tools they'll need for detecting them. |
InternetNews August 27, 2010 |
Researcher Warns of New 64-Bit Windows Rootkit Security research firm Prevx warns that a new iteration of a familiar rootkit, TDL3, is now in the wild and threatens to compromise 64-bit Windows systems. |
PC Magazine April 20, 2005 Larry Seltzer |
Rootkits: The Ultimate Stealth Attack These underhanded programs go to great lengths to conceal themselves. Luckily, help is on the way. |
InternetNews June 13, 2006 Andy Patrizio |
New Means To Root Out Malware Malware continues to be a problem for customers, with many users unaware their systems are infected with some kind of hidden "bot" that steals their personal info or hijack's their computer. |
InternetNews September 5, 2007 Andy Patrizio |
Made in China: Virus-Laden Web Pages A report finds China has the most compromised Web pages serving up malware. |
Bank Technology News January 2010 John Adams |
Results First, Pay Later A growing wave of malware is plaguing Web banking, and new attacks are so effective that the market for a second line of defense is buzzing with activity. |
InternetNews December 17, 2008 |
Warning, Your Antivirus Software May be Leaky If you think you're protected because you have antivirus applications installed, think again. |
InternetNews September 9, 2008 Andy Patrizio |
Malware Scanning Moves to the Cloud Instead of burdening the client computer with all the scanning work, antivirus vendors are doing the processing on their systems. |
PC Magazine September 27, 2006 Robert Lemos |
Your Own Personal Matrix How rootkits can take over your computer and steal data under your nose and how to stop them. |
InternetNews October 26, 2006 Ed Sutherland |
Zombies Control Half of Windows PCs Software giant Microsoft has crowned the "zombie" PC the greatest threat to Windows users. |
Inc. April 2009 |
Security: Free Antivirus Software Three choices for antivirus software for your small business or home. |
InternetNews March 2, 2010 |
Microsoft Patch Aims to Stop Rootkit The latest patch from Microsoft is designed to address a malware distribution that affected some users of Windows XP. |
InternetNews April 28, 2010 |
Microsoft Warns Infected PCs on the Rise Microsoft's latest Security Intelligence Report found that the number of infected PCs rose by 1.7 million in the second half of 2009, but improved monitoring is helping flag and clean the corrupted systems. |
PC Magazine October 4, 2011 Neil J. Rubenking |
Webroot SecureAnywhere Antivirus Webroot SecureAnywhere Antivirus's minuscule local client communicates with a gigantic cloud database to provide excellent protection against malware attack, and it also does a very good job cleaning up existing malware infestations. |
InternetNews January 26, 2007 Andy Patrizio |
Tracking The Malware Battle The crooks are adjusting their tactics, but so are the people trying to keep you safe. Is malware becoming a certainty? |
PC Magazine July 25, 2007 Neil J. Rubenking |
GarbageClean 2.0 Don't rely on GarbageClean for malware protection. It doesn't matter how little it costs -- it's still garbage. |
PC World August 2006 Andrew Brandt |
New Rootkit Detectors Help Protect You and Your PC Malware that can be particularly well hidden are ferreted out by these free tools. |
PC Magazine April 10, 2008 Neil J. Rubenking |
Avast! Antivirus 4.8 Home Edition The free avast! antivirus now blasts spyware and does it nearly as well as the top products. |
PC Magazine March 26, 2010 Neil J. Rubenking |
Lab Testing Antivirus Software Roundup Many users prefer to build their own protective suite from separate best-of-breed components. Here's a run-down of your choices for standalone antivirus utilities. |
PC Magazine September 1, 2011 Neil J. Rubenking |
AVG Anti-Virus Free 2012 AVG Anti-Virus Free 2012 scans quickly and does a good job both cleaning up existing malware and preventing new infestation. Independent labs rate it high, too, and it includes bonus protection against phishing and exploits. |
PC Magazine August 17, 2009 Neil J. Rubenking |
BitDefender Total Security 2010 BitDefender Internet Security 2010 is strong where many suites are weak, and includes top-notch malware detection... eScan Internet security Suite for Home Users Version 10... |
PC Magazine November 2, 2005 Seltzer Rubenking |
The Zero-Day Attack StarForce's Personal Safe'n'Sec... Prevx Pro 2005... Panda's TruPrevent... PivX preEmpt... Tips for installing behavior blocking software... ZoneAlarm Internet Security Suite 6... McAfee Internet Security Suite 2006... BitDefender 9 Internet Security... Panda Platinum 2006 Internet Security... Norton Internet Security 2006... Trend Micro PC-cillin Internet Security 2006... |
PC Magazine June 9, 2010 Neil J. Rubenking |
Panda Cloud Antivirus 1.1 Review & Rating Panda Security has spent the last few years mastering behavior-based detection, cloud-based antivirus scanning, and free security software. Panda Cloud Antivirus 1.1 (free, direct) brings all these threads together. |
PC Magazine November 13, 2009 Neil J. Rubenking |
Panda Cloud Antivirus Free Edition 1.0 Panda Cloud Antivirus offers free malware protection in a lightweight package with an ultra-fresh user interface... Norton Internet Security 2010... |
Information Today November 7, 2013 Donovan Griffin |
Anti-Malware Options in 2013 Malware is a booming business, and anti-malware companies by necessity continually play a game of catch-up in updating their watch lists. |
InternetNews January 20, 2011 |
New Worm Takes Twitter Users For a Ride Twitter fans have a new malware campaign to worry about this week after security researchers at Kaspersky Lab identified a new scareware come-on. |
PC World December 31, 2007 Erik Larkin |
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. |
T.H.E. Journal August 2006 Doug Gale |
Can This Virus Be 'Rooted' Out? A new kind of hard-to-detect malware is increasing our vulnerability to hackers and creating headaches for makers of antiviral software. |
InternetNews August 2, 2006 Andy Patrizio |
Who's Who in Antivirus Software? Despite dominant players, the Black Hat conference has a big cast. Now if only people will use their products. |
InternetNews January 10, 2008 Andy Patrizio |
New Rootkit Targets the Drive's MBR The bad guys got the idea from Black Hat and a security firm, illustrating the risks of bringing vulnerabilities to light. |
PC World July 2005 Andrew Brandt |
Security Tips: Identify Malware Hiding in Windows' System Folders Fortunately, once identified, malware is usually fairly easy--albeit tedious--to clean up. So follow these detection procedures, and your PC will be in good shape. Also, several available programs will help you spot, and in one case, remove, dangerous rootkit files. |
PC World August 2006 Andrew Brandt |
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. |
PC World August 25, 2006 Narasu Rebbapragada |
Spyware Fighters Five antispyware programs focus on tackling the latest threats: Webroot Spy Sweeper 5.0, Spyware Doctor 3.8, CounterSpy 2.0, Ad-Aware SE Personal 1.06, and Spybot. |
PC Magazine March 21, 2007 Neil J. Rubenking |
Spyware Doctor with AntiVirus 5.0 From-scratch rewrite has the virtues and problems of a brand-new program. |
PC Magazine January 16, 2007 Neil J. Rubenking |
Prevx1 Individual Prevx1 blocks known threats and identifies unknowns by their misbehavior. |
PC Magazine February 1, 2006 Cade Metz |
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. |
Bank Technology News February 2007 Glen Fest |
Anti-Malware: Calling Off the Watchdogs First National Bank of Bosque County opts out of anti-virus protection for a new whitelisting, or application control, approach. |
PC Magazine July 6, 2010 Neil J. Rubenking |
Free Virus and Spyware Protection: What's Right for You? Everyone needs antivirus and antispyware software, but not everyone wants to pay for them. The for-pay versions are the best, but some of the free security software is great, too -- and some is terrible. We tell you which is which. |
PC Magazine February 2, 2005 Gottesman & Karagiannis |
A False Sense of Security Only 85 percent of the AOL/NCSA survey respondents were running antivirus software. Worse, while 71 percent of those people thought they were updating their protection at least weekly (including automatic updates), barely half of them actually were. |
InternetNews November 14, 2005 Jim Wagner |
Microsoft to Block Sony DRM Rootkit Microsoft has joined other security vendors in pursuit of the rootkit component to Sony's now-infamous anti-piracy measure. |
Search Engine Watch October 5, 2010 Kristi Hines |
Safeguarding Your PC When Link Building Here's what you can do to protect your computer while checking out your competitors' backlinks and avoid losing valuable productivity time if your machine gets infected with malware. |
InternetNews November 30, 2010 |
Most New Malware Disappears Within A Day: Study New strains of malware are popping up at an unprecedented rate but, fortunately, most of these variants are stamped out within the first 24 hours. |
PC Magazine April 20, 2007 Neil J. Rubenking |
Panda Anti-Rootkit For safely removing every rootkit trace on your system, Panda is the way to go. |
InternetNews February 27, 2007 Ed Sutherland |
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. |
InternetNews December 1, 2009 |
Security Firm Takes Back Black Screen Claim Update patches to Windows are not the cause of users' woes after all. |
InternetNews May 19, 2010 |
'Lost' Finale Gives Cyber Crooks New Bait With the end of the popular ABC drama, hackers are exploiting viewers' interest to spread all sorts of malware. |
PC Magazine June 5, 2008 |
Malware Everywhere Malicious software attacks, including Trojan horses, bots, and rootkits, are rising at the fastest rate ever. |